Research

Hijacking of Dallas Outdoor Warning Siren System

Hijacking of Dallas Outdoor Warning Siren System

A hacker managed to gain control of the city’s Outdoor Warning Siren System and triggered it causing all 156 sirens across the city to suddenly sound the alarm, leading to widespread panic and confusion. First Published 13th April 2017 "Now hear this!" 4 min read | Reflare Research Te …

Read Story

Bail Hearing in Yahoo! Hacking Case

Bail Hearing in Yahoo! Hacking Case

Karim Baratov is accused of using his role as a "criminal hacker-for-hire" and conspiring to harvest users' personal data from Yahoo's network using no less than five different methods. First Published 6th April 2017 "Bail? Yaaaa Hooooooo!!!" 4 min read | Reflare Research Team As we r …

Read Story

A New Approach to Cyber Ransoms

A New Approach to Cyber Ransoms

With Ransomware, critical data is encrypted and then used to extort payment from the owners of said data. However, are organisations like Apple more likely to eat the cost than give in due to their strong security culture? First Published 30th March 2017 At what cost will Apple protec …

Read Story

US Indictment of 4 Alleged Russian Cyber Attackers

US Indictment of 4 Alleged Russian Cyber Attackers

The US Department of Justice unsealed a grand jury indictment against four men, including two officers of Russia’s Federal Security Service for engaging in cyber attacks on behalf of Russian intelligence. First Published 16th March 2017 A 'Perry Mason moment' it was not. 4 min read | …

Read Story

A Look at the Vault 7 Leaks

 A Look at the Vault 7 Leaks

Wikileaks released a set of documents, which are allegedly a part of the CIA arsenal. The release was named Vault 7, a compilation of secret-classed files from the CIA’s Center for Cyber Intelligence. First Published 9th March 2017 The holiday residence of Mr. J Assange - professional …

Read Story

A Rare Glimpse Into the Mechanics of a Major Breach

It’s almost inconceivable that Yahoo! suffered a breach of over 500 million user accounts, and it wasn’t even detected by Yahoo’s management team until years later. Yet here we are. First Published 2nd March 2017 "Database backups have been leaked"... yeah, um, that should be fine, ri …

Read Story

Banning a Smart Doll

Banning a Smart Doll

Cayla is a child's doll which is equipped with speech recognition software and is connected to the internet via Bluetooth. German authorities have taken a strong disliking to Cayla. Poor Cayla. First Published 23rd February 2017 I am... doll parts. 4 min read | Reflare Research Team I …

Read Story

Further Anomalies in Russian Cybersecurity

The original allegations that Russia had hacked Ukraine and its electrical grid haven't been borne out, but they did spur more instances of alleged Russian cyber attacks. The most recent cases involve the Czech government and experts in the cyber security field. First Published 2nd Fe …

Read Story

Hacking, Rationality, and the Fear of the Unknown

Rationality in the face of threats, from germs to crime, has been studied before in many different settings. There is, however, a category of threats that haven’t been covered as extensively, and that is cyber security. First Published 19th January 2017 Just cause you feel it doesn't …

Read Story

Suspected North Korean Involvement in South Korea Hacks

Suspected North Korean Involvement in South Korea Hacks

The recent cyber attacks in South Korea have some of the ‘North Korea fingerprints’ on them. A look at the chronology of North Korean cyber retaliation over the past years shows a history of targeting South Korean critical infrastructure, not just the government. First Published 7th D …

Read Story

Subscribe by email